Preview

security breaches

Best Essays
Open Document
Open Document
2967 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
security breaches
Internet Security Breaches
February 8
2013

This report about the five most significant security breaches of the past six months ago.
Nasser Algaber W20055883 Yosuf Altayar W20055881

Index
Subtitle pages
Introduction 3
Cyber Fraud 3-5
Data breaches 5-7
Network intrusion/ Hacking 7-10
Launching worms 10-11
Cyber bullying 11-12
Category of internet security Breaches 12
Reference 13

Introduction
The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.
Cyber Fraud
Cyber fraud can be defined as the use of software or internet services to defraud victims or taking advantage of them. This includes stealing information that is considered personal, in what constitutes identity theft. One of the most common forms of internet fraud entails distributing rogue security software. Internet technology has created the allowance for criminals to carry out fraudulent transactions, as well as transmit the proceeds of the frauds to other institutions. Cyber frauds occur in message boards, websites, emails and even chat rooms (Messner, 2012).
Purchase fraud is an example of cyber fraud and occurs when a perpetrator proposes a business transaction to a merchant, only to use fraudulent mechanisms,



References: In Defense of Data (2013) Data Breach trends and StatisticsRetrieved on February 6th, 2013, from http://www.cbc.ca/news/technology/story/2012/06/29/f-dns-ending.html Hazelden Foundation. (2012) Cyberbullying: A Prevention Curriculum for Grades 6-12 Scope and SequenceRetrieved on February 6th, 2012, from http://www.cyberbullyhelp.com/cyberBullying_ScopeSequence.pdf Messner, E. (2012). The Worst Data Breach Incidents of 2012: Out of 189 breaches recorded through mid-June, here are the top 15 according to Identity Theft Resource Center. Retrieved on February 6th, 2013, from http://www.csoonline.com/slideshow/detail/52656 Nnap (2011).Top 125 Network Security tools. Retrieved on February 6th, 2012, from http://Sectools.org/ Quinlan, M. (2012).Thousands May lose internet accessibility July 9 as a result of virus; The FBI to shut down temporary servers to block DNSChangervictims. Retrieved on February 6th, 2013, from http://www.cbc.ca/news/technology/story/2012/06/29/f-dns-ending.html Thiel, J. (2012). IDS/IPS: An Introduction to Intrusion Detection and Prevention Systems. Retrieved on February 6th, 2013, from http://www.ece.drexel.edu/telecomm/Talks/thiel.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Data soon became available after authentication breach * Revealed hole in ChoicePoint security system * Trust of security standards instantly lost…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Beginning in 2007, the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this is to perform an assessment of the potential issues with all areas of the network. A preliminary security assessment will begin the task of identifying a list of vulnerabilities (weaknesses and flaws) that could possibly be exploited by a threat (Develop, n.d.).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Stevens, G.M. (2008) “CRS Report for Congress: Federal Information Security and Data Breach Notification Laws”, Congressional Research Service…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    References: Defense in Depth: It is more than just the technology; retrieved on February 20, 2012 from www.isa.org/intech…

    • 1927 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays